Browse Items (9158 total)

2_A+Review+Of+Smishing+Attaks+Mitigation+Strategies.pdf
Mobile Smishing crime has continued to escalate globally due to technology enhancements and people's growing dependence on smartphones and other technologies. SMS facilitates the distribution of crucial information that is principally important for…

10950-37330-1-PB.pdf
This study aims to determine the process of activities, contributions, and obstacles as well as efforts that have been taken in supervisory activities in an effort to explore the potential of SME Final Income Tax in 2021 and 2022 at KPP Pratama…

editor,+2_A+Review+on+the+Methods+of+Evaluating+the+New.pdf
In the recent years, Agile is being one of the emerging technologies adopted by numerous organizations. The Agile technology has not obtained an extensive acceptance in the software development organizations (SDOs), but it is also being broadly…

4018-Article Text-12526-1-10-20220630.pdf
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation,
malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and…

document (3).pdf
Objective: Influencers are known to have a solid influence on generating purchase intentions in consumers. Therefore, this study aims to examine the effect of opinion leadership, parasocial relationships, and credibility identified through the…

document (1).pdf
Objective: Security, privacy, perceived value, and trust are essential elements in reusing intention in an e-commerce application. The lower the security, privacy, perceived value, and trust of a consumer will reduce the reuse intention of an…

6_A+Study+on+Wearable+Tech+Interfaces+and+Perception+Cognitive+AI-Enabled+Device.pdf
In our paper, we explore the possibility of utilizing state-of-the-art hardware architecture to develop an interactive Artificial Intelligence(AI) based virtual agent in an Internet of Things (IoT) enabled smart glass. In contrast to the traditional…

16725-Article Text-73213-2-10-20231006.pdf
In this paper, a 180-nm CMOS ring oscillator design, made with halo-implanted transistors andoperating in the weak inversion region, is proposed, based on an undergraduate integrated circuit design course methodology for building…

2_A+Survey+of+Deep+Learning+Solutions+for+Anomaly.pdf
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly detection in this case is…

4_A+Systematic+Literature+Review+of+Hausa+Natural.pdf
The processing of natural languages is an area of computer science that has gained growing attention recently. NLP helps computers recognize, in other words, the ways in which people use their language. NLP research, however, has been performed…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2